Methods, apparatus, and computer program products for subscriber authentication and temporary code generation

a technology of subscriber authentication and code generation, applied in the field of subscriber authentication and temporary code generation, can solve the problems of stealing or altering username and passwords by unscrupulous methods for malicious inten

Active Publication Date: 2011-03-03
AT&T MOBILITY II LLC
View PDF12 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A variety of unscrupulous methods exist to steal ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
  • Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
  • Methods, apparatus, and computer program products for subscriber authentication and temporary code generation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013]In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the present disclosure may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present disclosure.

[0014]FIG. 1 illustrates a block diagram 100 in accordance with exemplary embodiments. The block diagram 100 illustrates user equipment (UE) which is a communication device such as a smart phone, mobile device, personal digital assistant (PDA), set top box, cell phone, computer, etc.

[0015]The user of the UE 5 may desire to utilize the wireless services of a service provider infrastructure 105, such as for example AT&T's® MOBILITY Infrastructure. The UE 5 is configured to go through an authentication process, such as triplet authentication, to be authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Method, apparatus, and computer products are provided for providing temporary generated codes by a server. Responsive to triplet authentication of a device to service provider network, a server receives an initial code from the device to request a temporary generated code. The server verifies the triplet authentication of device. The server determines whether there is a user account match to the initial code. The server determines a corresponding application server based on the initial code and the user account match. The server generates a temporary generated code to access the application server. The temporary generated code is transmitted to both the application server and the communication device, is set to expire at a preset time, is generated to allow the user access to a single session on the application server, and is generated to expire after the temporary generated code is input to access the single session on application server.

Description

BACKGROUND[0001]Exemplary embodiments relate to, but are not limited to, subscriber authentication and temporary code generation for gaining access to restricted computer systems.[0002]Users daily access many portals with communication devices, such as smart phones, computers, etc. A computer system may have confidential applications and data stored in the system's memory. To prevent unauthorized access, most computer systems only employ a username and a password. Thus, a person who wishes to steal confidential information from a computer system would only need the owner's username and password to gain access. A variety of unscrupulous methods exist to steal or alter the username and password for malicious intent. Additional levels of protection would help to prevent theft of confidential information of a computer system.BRIEF SUMMARY[0003]Exemplary embodiments include a method for providing temporary generated codes by a portal authentication server for portal authentication. In re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F21/20
CPCG06F21/31H04L9/321H04L63/0884H04L63/08H04L9/3228
Inventor DOWLATKHAH, SANGAR
Owner AT&T MOBILITY II LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products